Kconfig 1.5 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152
  1. config VFIO_IOMMU_TYPE1
  2. tristate
  3. depends on VFIO
  4. default n
  5. config VFIO_IOMMU_SPAPR_TCE
  6. tristate
  7. depends on VFIO && SPAPR_TCE_IOMMU
  8. default n
  9. config VFIO_SPAPR_EEH
  10. tristate
  11. depends on EEH && VFIO_IOMMU_SPAPR_TCE
  12. default n
  13. config VFIO_VIRQFD
  14. tristate
  15. depends on VFIO && EVENTFD
  16. default n
  17. menuconfig VFIO
  18. tristate "VFIO Non-Privileged userspace driver framework"
  19. depends on IOMMU_API
  20. select VFIO_IOMMU_TYPE1 if (X86 || S390 || ARM_SMMU || ARM_SMMU_V3)
  21. select VFIO_IOMMU_SPAPR_TCE if (PPC_POWERNV || PPC_PSERIES)
  22. select VFIO_SPAPR_EEH if (PPC_POWERNV || PPC_PSERIES)
  23. select ANON_INODES
  24. help
  25. VFIO provides a framework for secure userspace device drivers.
  26. See Documentation/vfio.txt for more details.
  27. If you don't know what to do here, say N.
  28. menuconfig VFIO_NOIOMMU
  29. bool "VFIO No-IOMMU support"
  30. depends on VFIO
  31. help
  32. VFIO is built on the ability to isolate devices using the IOMMU.
  33. Only with an IOMMU can userspace access to DMA capable devices be
  34. considered secure. VFIO No-IOMMU mode enables IOMMU groups for
  35. devices without IOMMU backing for the purpose of re-using the VFIO
  36. infrastructure in a non-secure mode. Use of this mode will result
  37. in an unsupportable kernel and will therefore taint the kernel.
  38. Device assignment to virtual machines is also not possible with
  39. this mode since there is no IOMMU to provide DMA translation.
  40. If you don't know what to do here, say N.
  41. source "drivers/vfio/pci/Kconfig"
  42. source "drivers/vfio/platform/Kconfig"
  43. source "virt/lib/Kconfig"